IGCSE Computer Science Chapter 9 - Security
IGCSE Computer Science Chapter 9 - Security
Chapter 9 - Security
9.01 Introduction
Computer systems are used to store and process data in many ways:
Backups
❖ once data is lost, we cannot get it back
❖ a sensible safety measure is to make a copy of the data
❖ backup: copy of data being used that we can keep in case of data loss
❖ the data is copied onto a separate storage medium (kept separate from main
system)
❖ if data is accidentally lost, corrupted, or deleted, the copy of the data can be
transferred back to the computer system
● bank: make backups several times each day because the number of
financial transactions taking place and the importance they have
● doctor’s surgery: make a backup of patient records each evening
● school: make a backup of student and teacher records at the end of each
week
● home user: make a backup occasionally
automatic backup:
manual backup:
Verification
❖ prevent data loss from occurring in the first place
❖ verification: a check that asks the user to confirm whether or not they wish to
go ahead with an instruction (normally in the form of a question in a dialogue
box, and user responds with a confirmation or cancellation)
● when attempting to save a file with a filename that already exists in that
location
● when copying an older version of a file into a folder that contains a newer
version of that document
● when deleting a record or amending data in a database
4
Malware
❖ designed to disrupt or modify a computer system and its data
❖ installed on a computer system without the user’s knowledge
❖ software is accidentally downloaded from email attachments, USB RAM sticks,
and websites
❖ can cause considerable damage, or at the least, great inconvenience
types of malware:
Phishing
❖ phishing: attempt to gain something (data) by using bait
❖ usually comes in the form of an email
5
❖ the email will look like it is from a person or organisation that is known to and
trusted by the user
❖ eg. from banks or online auction sites
❖ email often states that there is a problem with the user’s online account and asks
from confirmation of personal data to investigate the issue
❖ designed to trick a user into giving data such as back account details, or
usernames and passwords to websites
❖ a phishing email looks like a genuine email, but usually asks the user to click on a
hyperlink
❖ the hyperlink then transfers the user to a fake website that looks like the
organisation’s real website
❖ the website asks the user to enter their personal data
❖ this personal data is used by criminals to steal money or buy items online
Pharming
❖ pharming: attempts to trick the user into giving their personal data by using
fake websites
❖ when user tries to visit a genuine website, they are re-directed to a fake website
that looks very much like the real site
❖ each website has a domain name that is translated into an IP address
❖ the user’s browser is directed to the IP address, giving access to the website
❖ malware installed on the user’s computer looks for domain names of reputable
sites and translates them into different IP addresses, those of fake websites
❖ instead of visiting a genuine website, the user is directed to a fake website
instead
Physical Security
❖ physical security: security which prevents physical access to a computer
❖ prevents local access to the system and data
● locks: computer system, data, and backups can be kept in a locked room,
so only authorised users can have physical access
● CCTV: cameras can be used to monitor who physically accesses a system,
and can help deter users who have no authority as they know they will be
seen accessing the data
● security guards: employing security guards where data is especially
sensitive as an extra level of security to help deter those users who do not
have permission to access a computer system
❖ simple and can be quite effective
❖ but only prevent or deter a user from accessing a data without permission
❖ cannot help recover data that has been lost
Authentication
❖ authentication: security which prevents access to a computer even if the user
has physical access
7
weak passwords:
● date of birth
● name of family member
● name of pet
● their initials
● favourite item, hobby, or place